2021
DOI: 10.31590/ejosat.1010023
|View full text |Cite
|
Sign up to set email alerts
|

An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types

Abstract: The Internet of Things (IoT) is a global network of devices that can communicate with each other through different communication protocols and have the ability to detect and process data. Since the Internet of Things connects electronic devices to the Internet for efficient examination and execution of daily activities, it has a seriously positive effect on human life. These devices use some communication protocols to communicate with each other. The selection of these communication protocols is of great impor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 24 publications
0
1
0
Order By: Relevance
“…Replay Attack [41][42][43] When a malicious user falsely delays or retransmits a secure network message to trick the intended recipient into performing the hacker's desired action, this is known as a replay attack. Several types of replay attacks can be used against IoT devices, including authentication replay attacks, session hijacking replay attacks, and encrypted data replay attacks.…”
Section: Attack Portrayal Purposementioning
confidence: 99%
“…Replay Attack [41][42][43] When a malicious user falsely delays or retransmits a secure network message to trick the intended recipient into performing the hacker's desired action, this is known as a replay attack. Several types of replay attacks can be used against IoT devices, including authentication replay attacks, session hijacking replay attacks, and encrypted data replay attacks.…”
Section: Attack Portrayal Purposementioning
confidence: 99%
“…This layer holds significant importance as it facilitates the development of diverse applications utilized across various industrial and educational sectors e.g., smart cities, industry automation, agriculture, health care, and big data processing, which increases its significance [18]. The IoT framework does not adhere to any international standards; due to this, the application layer can suffer from several attacks [19]. In this layer, the attacker targets the running IoT system software, i.e., remote health monitoring software etc and gains access to the sensitive data by exploiting the software [20].…”
Section: Application Layermentioning
confidence: 99%